Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:2830-1

Опубликовано: 14 июл. 2023
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2023-1079: Fixed a use-after-free problem that could have been triggered in asus_kbd_backlight_set when plugging/disconnecting a malicious USB device (bsc#1208604).
  • CVE-2023-1249: Fixed a use-after-free flaw in the core dump subsystem that allowed a local user to crash the system (bsc#1209039).
  • CVE-2023-1637: Fixed vulnerability that could lead to unauthorized access to CPU memory after resuming CPU from suspend-to-RAM (bsc#1209779).
  • CVE-2023-2002: Fixed a flaw that allowed an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication (bsc#1210533).
  • CVE-2023-3090: Fixed a heap out-of-bounds write in the ipvlan network driver (bsc#1212842).
  • CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051).
  • CVE-2023-3141: Fixed a use-after-free flaw in r592_remove in drivers/memstick/host/r592.c, that allowed local attackers to crash the system at device disconnect (bsc#1212129).
  • CVE-2023-3159: Fixed use-after-free issue in driver/firewire in outbound_phy_packet_callback (bsc#1212128).
  • CVE-2023-3161: Fixed shift-out-of-bounds in fbcon_set_font() (bsc#1212154).
  • CVE-2023-3268: Fixed an out of bounds flaw in relay_file_read_start_pos in kernel/relay.c that allowed a local attacker to crash the system or leak kernel internal information (bsc#1212502).
  • CVE-2023-3358: Fixed a NULL pointer dereference flaw in the Integrated Sensor Hub (ISH) driver (bsc#1212606).
  • CVE-2023-35824: Fixed a use-after-free in dm1105_remove in drivers/media/pci/dm1105/dm1105.c (bsc#1212501).

The following non-security bugs were fixed:

  • Fix missing top level chapter numbers on SLE12 SP5 (bsc#1212158).
  • Move setting %%build_html to config.sh
  • Move setting %%split_optional to config.sh
  • Move setting %%supported_modules_check to config.sh
  • rpm/kernel-binary.spec.in: Fix compatibility wth newer rpm
  • rpm/kernel-docs.spec.in: pass PYTHON=python3 to fix build error (bsc#1160435)

Список пакетов

Image SLES15-SP1-SAP-Azure-LI-BYOS-Production
cluster-md-kmp-default-4.12.14-150100.197.151.1
dlm-kmp-default-4.12.14-150100.197.151.1
gfs2-kmp-default-4.12.14-150100.197.151.1
kernel-default-4.12.14-150100.197.151.1
ocfs2-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production
cluster-md-kmp-default-4.12.14-150100.197.151.1
dlm-kmp-default-4.12.14-150100.197.151.1
gfs2-kmp-default-4.12.14-150100.197.151.1
kernel-default-4.12.14-150100.197.151.1
ocfs2-kmp-default-4.12.14-150100.197.151.1
SUSE Linux Enterprise High Availability Extension 15 SP1
cluster-md-kmp-default-4.12.14-150100.197.151.1
dlm-kmp-default-4.12.14-150100.197.151.1
gfs2-kmp-default-4.12.14-150100.197.151.1
ocfs2-kmp-default-4.12.14-150100.197.151.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS
kernel-default-4.12.14-150100.197.151.1
kernel-default-base-4.12.14-150100.197.151.1
kernel-default-devel-4.12.14-150100.197.151.1
kernel-devel-4.12.14-150100.197.151.1
kernel-docs-4.12.14-150100.197.151.1
kernel-macros-4.12.14-150100.197.151.1
kernel-obs-build-4.12.14-150100.197.151.1
kernel-source-4.12.14-150100.197.151.1
kernel-syms-4.12.14-150100.197.151.1
SUSE Linux Enterprise Live Patching 15 SP1
kernel-default-livepatch-4.12.14-150100.197.151.1
kernel-default-livepatch-devel-4.12.14-150100.197.151.1
kernel-livepatch-4_12_14-150100_197_151-default-1-150100.3.3.1
SUSE Linux Enterprise Server 15 SP1-LTSS
kernel-default-4.12.14-150100.197.151.1
kernel-default-base-4.12.14-150100.197.151.1
kernel-default-devel-4.12.14-150100.197.151.1
kernel-default-man-4.12.14-150100.197.151.1
kernel-devel-4.12.14-150100.197.151.1
kernel-docs-4.12.14-150100.197.151.1
kernel-macros-4.12.14-150100.197.151.1
kernel-obs-build-4.12.14-150100.197.151.1
kernel-source-4.12.14-150100.197.151.1
kernel-syms-4.12.14-150100.197.151.1
reiserfs-kmp-default-4.12.14-150100.197.151.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1
kernel-default-4.12.14-150100.197.151.1
kernel-default-base-4.12.14-150100.197.151.1
kernel-default-devel-4.12.14-150100.197.151.1
kernel-devel-4.12.14-150100.197.151.1
kernel-docs-4.12.14-150100.197.151.1
kernel-macros-4.12.14-150100.197.151.1
kernel-obs-build-4.12.14-150100.197.151.1
kernel-source-4.12.14-150100.197.151.1
kernel-syms-4.12.14-150100.197.151.1
reiserfs-kmp-default-4.12.14-150100.197.151.1
openSUSE Leap 15.4
kernel-debug-base-4.12.14-150100.197.151.1
kernel-default-man-4.12.14-150100.197.151.1
kernel-kvmsmall-base-4.12.14-150100.197.151.1
kernel-vanilla-4.12.14-150100.197.151.1
kernel-vanilla-base-4.12.14-150100.197.151.1
kernel-vanilla-devel-4.12.14-150100.197.151.1
kernel-vanilla-livepatch-devel-4.12.14-150100.197.151.1
kernel-zfcpdump-man-4.12.14-150100.197.151.1
openSUSE Leap 15.5
kernel-vanilla-4.12.14-150100.197.151.1
kernel-vanilla-base-4.12.14-150100.197.151.1
kernel-vanilla-devel-4.12.14-150100.197.151.1
kernel-vanilla-livepatch-devel-4.12.14-150100.197.151.1

Описание

A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asus_kbd_leds *led structure. A malicious USB device may exploit the issue to cause memory corruption with controlled data.


Затронутые продукты
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-150100.197.151.1

Ссылки

Описание

A use-after-free flaw was found in the Linux kernel's core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 ("coredump: Use the vma snapshot in fill_files_note") not applied yet, then kernel could be affected.


Затронутые продукты
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-150100.197.151.1

Ссылки

Описание

A flaw that boot CPU could be vulnerable for the speculative execution behavior kind of attacks in the Linux kernel X86 CPU Power management options functionality was found in the way user resuming CPU from suspend-to-RAM. A local user could use this flaw to potentially get unauthorized access to some memory of the CPU similar to the speculative execution behavior kind of attacks.


Затронутые продукты
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-150100.197.151.1

Ссылки

Описание

A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication.


Затронутые продукты
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-150100.197.151.1

Ссылки

Описание

A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation. The out-of-bounds write is caused by missing skb->cb initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled. We recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.


Затронутые продукты
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-150100.197.151.1

Ссылки

Описание

A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().


Затронутые продукты
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-150100.197.151.1

Ссылки

Описание

A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.


Затронутые продукты
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-150100.197.151.1

Ссылки

Описание

A use after free issue was discovered in driver/firewire in outbound_phy_packet_callback in the Linux Kernel. In this flaw a local attacker with special privilege may cause a use after free problem when queue_event() fails.


Затронутые продукты
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-150100.197.151.1

Ссылки

Описание

A flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. When providing font->width and font->height greater than 32 to fbcon_set_font, since there are no checks in place, a shift-out-of-bounds occurs leading to undefined behavior and possible denial of service.


Затронутые продукты
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-150100.197.151.1

Ссылки

Описание

An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.


Затронутые продукты
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-150100.197.151.1

Ссылки

Описание

A null pointer dereference was found in the Linux kernel's Integrated Sensor Hub (ISH) driver. This issue could allow a local user to crash the system.


Затронутые продукты
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-150100.197.151.1

Ссылки

Описание

An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in dm1105_remove in drivers/media/pci/dm1105/dm1105.c.


Затронутые продукты
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-150100.197.151.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:kernel-default-4.12.14-150100.197.151.1

Ссылки
Уязвимость SUSE-SU-2023:2830-1